Description |
xxxii, 832 pages ; 23 cm + 1 CD-ROM (4 3/4 in.) |
|
4 3/4 in |
Contents |
1. Computer Forensics Fundamentals -- 2. Types of Computer Forensics Technology -- 3. Types of Computer Forensics Systems -- 4. Types of Vendor and Computer Forensics Services -- 5. Data Recovery -- 6. Evidence Collection and Data Seizure -- 7. Duplication and Preservation of Digital Evidence -- 8. Computer Image Verification and Authentication -- 9. Discovery of Electronic Evidence -- 10. Identification of Data -- 11. Reconstructing Past Events -- 12. Networks -- 13. Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups -- 14. The Information Warfare Arsenal and Tactics of the Military -- 15. The Information Warfare Arsenal and Tactics of Terrorists and Rogues -- 16. The Information Warfare Arsenal and Tactics of Private Companies -- 17. The Information Warfare Arsenal of the Future -- 18. Surveillance Tools for Information Warfare of the Future -- 19. Civilian Casualties: The Victims and Refugees of Information Warfare -- 20. Advanced Computer Forensics -- 21. Summary, Conclusions, and Recommendations |
Bibliography |
Includes bibliographical references and index |
Notes |
System requirements for accompanying CD-ROM: Windows 2000 or later; Adobe Acrobat 5.0 or higher; WinZip; Internet browser |
Subject |
Computer security.
|
|
Computer networks -- Security measures.
|
|
Forensic sciences.
|
LC no. |
2005007521 |
ISBN |
1584503890 paperback : with cd-rom alkaline paper |
|